Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords

被引:2
|
作者
Tihanyi, Norbert [1 ,2 ,3 ]
Kovacs, Attila [2 ]
Vargha, Gergely [1 ,3 ]
Lenart, Adam [1 ,3 ]
机构
[1] HUNGUARD Ltd, Kekgolyo U 6, H-1123 Budapest, Hungary
[2] Eotvos Lorand Univ, Dept Comp Algebra, H-1117 Budapest, Hungary
[3] Cyber Def Management Author, Natl Secur Author Hungary, Budapest, Hungary
关键词
Password analyzing; Patterns; Cracking method;
D O I
10.1007/978-3-319-24192-0_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present a regression based analyses of cleartext passwords moving towards an efficient password cracking methodology. Hundreds of available databases were examined and it was observed that they had similar behavior regardless of their size: password length distribution, entropy, letter frequencies form similar characteristics in each database. Exploiting these characteristics a huge amount of cleartext passwords were analyzed in order to be able to design more sophisticated brute-force attack methods. New patterns are exposed by analyzing millions of cleartext passwords.
引用
收藏
页码:89 / 101
页数:13
相关论文
共 24 条
  • [1] Graphical Passwords: A Qualitative Study of Password Patterns
    Vorster, Jo
    van Heerden, Renier
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 375 - 383
  • [2] On Multiple Password Interference of Touch Screen Patterns and Text Passwords
    Meng, Weizhi
    Li, Wenjuan
    Jiang, Lijun
    Meng, Liying
    [J]. 34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, 2016, : 4818 - 4822
  • [3] PASSWORD CRACKING BASED ON LEARNED PATTERNS FROM DISCLOSED PASSWORDS
    Chou, Hsien-Cheng
    Lee, Hung-Chang
    Yu, Hwan-Jeu
    Lai, Fei-Pei
    Huang, Kuo-Hsuan
    Hsueh, Chih-Wen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (02): : 821 - 839
  • [4] Using one-time passwords to prevent password phishing attacks
    Huang, Chun-Ying
    Ma, Shang-Pin
    Chen, Kuan-Ta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1292 - 1301
  • [5] A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords
    Veras, Rafael
    Collins, Christopher
    Thorpe, Julie
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (03)
  • [6] A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords
    Gong, Longyan
    Pan, Jingxin
    Liu, Beibei
    Zhao, Shengmei
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (01) : 122 - 130
  • [7] To the presentation of results of statistical analyses -: part one
    Urbanek, Tomas
    [J]. CESKOSLOVENSKA PSYCHOLOGIE, 2007, 51 (06): : 601 - 609
  • [8] DNA microarray and genes expression patterns Part one: design and use
    Bogard, M.
    Ameziane, N.
    Lamoril, J.
    [J]. IMMUNO-ANALYSE & BIOLOGIE SPECIALISEE, 2008, 23 (02): : 71 - 88
  • [9] An efficient algorithm for mining high utility patterns from incremental databases with one database scan
    Yun, Unil
    Ryang, Heungmo
    Lee, Gangin
    Fujita, Hamido
    [J]. KNOWLEDGE-BASED SYSTEMS, 2017, 124 : 188 - 206
  • [10] Implementing One-Time Password Mutual Authentication Scheme on Sharing Renewed Finite Random Sub-Passwords Using Raspberry Pi as a Room Access Control to Prevent Replay Attack
    Taufiq, Muhammad
    Ogi, Dion
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICELTICS): INTELLIGENT DEVICES AND COMPUTING FOR ACCELERATING INDUSTRY 4.0 AND ENRICHING SMART SOCIETIES, 2018, : 13 - 18